bug-guix
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

bug#49029: ungoogled-chromium failed to disable malware extension The Gr


From: Jorge P. de Morais Neto
Subject: bug#49029: ungoogled-chromium failed to disable malware extension The Great Suspender
Date: Tue, 15 Jun 2021 13:59:44 -0300

Hi.  I didn't receive your email (I did this reply from Emacs debbugs
package).  Please include my email address in further messages to
mitigate the risk that I miss them.  I continue below:

On 06/15/21 09:49 , Leo Famulari wrote:
> Chromium is a program that is meant to be "evergreen".  Version
> numbers are not highlighted to the user and the software is supposed
> to update itself, quickly and often.  It's like a "rolling release"
> just for that program.

> A variant of the package that blocks communication to Google and
> requires one of us to update it is, if you trust the Chromium team,
> categorically less up-to-date than a "normal Chromium" downloaded
> directly from chromium.org, and thus also less "secure", as you've seen.

> I don't know exactly how the "disable malware extensions" mechanism
> works, but it's likely that the "ungoogling" disables the possibility
> that it can happen quickly, outside of full program updates.
>
> It's a tradeoff we (have to?) make to offer a variant of Chromium that
> is judged acceptable by us under the Free System Distribution
> Guidelines, which Guix follows:

I can accept a reasonable trade-off, but I still believe this should be
actively communicated to users.  It is not obvious.  If had known that
before, I would certainly have been more careful with extensions.
Indeed, now that I know, I have not only deleted my old
(ungoogled-)Chromium profile, but also, on the new profile, I installed
only HTTPS Everywhere and Privacy Badger extensions.  I have also
changed an important password that I remember having used on the
malware-infected Chromium.

> By the way, the Debian testing branch is the last to receive security
> updates, and in general has no guarantee of fast security updates.  If
> you want to use a Debian with more up-to-date software than the stable
> branch and also are concerned about your security, you might consider
> using Debian sid.

Thank you for the advice.  I already knew that though, and I think the
security risk of Debian testing is mitigated by my care.  I have
installed and configured debsecan.  It emails be about Debian
vulnerabilities, and then, in aptitude, I manually pull important
security updates from Debian unstable (sid).

That is a bit time-consuming, but I fear that going full unstable would
be too unreliable (more breakages) and would remove the option of
settling in stable without reinstalling.  I mean, since my sources.list
refers to bullseye, then, when it becomes stable, I will have Debian
stable and will have a choice whether (and when) to upgrade to the new
testing (bookworm).

Regards!

-- 
- https://stallmansupport.org "In Support of Richard Stallman"
- If an email of mine arrives at your spam box, please notify me.
- Please adopt free/libre formats like PDF, ODF, Org, LaTeX, Opus, WebM and 7z.
- Free/libre software for Replicant, LineageOS and Android: https://f-droid.org
- https://www.gnu.org/philosophy/free-sw.html "What is free software?"





reply via email to

[Prev in Thread] Current Thread [Next in Thread]